Characteristics of surveillance video generally include low resolution and poor quality due to environmental, storage and processing limitations. It is extremely difficult for comp...
Frank Lin, Clinton Fookes, Vinod Chandran, Sridha ...
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
This paper describes our study into the concept of using rewards in a classifier system applied to the acquisition of decision-making algorithms for agents in a soccer game. Our a...
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...